
Summary
This rule was designed to monitor Linux environments for suspicious network activity related to the execution of the 'cat' command. The 'cat' command, commonly used to concatenate and display file contents, can be misused by attackers to exfiltrate sensitive information when combined with `/dev/tcp` or `/dev/udp`. The rule alerts upon the execution of the 'cat' command followed by a network connection attempt by that same process. This is considered a risky behavior that may indicate data exfiltration efforts or command and control (C2) activities. The rule operates by correlating process executions with network events within a specified time frame, triggering alerts if the sequence matches the established patterns. Investigative guidelines detail steps to identify the involved user, review corresponding network activity, and assess potential false positives. The ultimate goal is to enable timely detection, triage, and remediation actions against potential security incidents stemming from this suspicious activity.
Categories
- Endpoint
- Linux
Data Sources
- Process
- Network Traffic
- File
Created: 2023-09-04